ietf
[Top] [All Lists]

Review of draft-ietf-sip-eku

2009-07-15 15:06:10
I reviewed the document draft-ietf-sip-eku in general
and for its operational impact.

Operations directorate reviews are solicited primarily to help the area
directors improve their efficiency, particularly when preparing for IESG
telechats, and allowing them to focus on documents requiring their attention
and spend less time on the trouble-free ones.

Improving the documents is important, but clearly a secondary purpose.
A third purpose is to broaden the OpsDir reviewers' exposure to work going
on in other parts of the IETF.

Reviews from OpsDir members do not in and of themselves cause the IESG to
raise issue with a document. The reviews may, however, convince individual
IESG members to raise concern over a particular document requiring further
discussion. The reviews, particularly those conducted in last call and
earlier, may also help the document editors improve their documents.

--

Review Summary:
Intended status: Proposed Standard

   This specification documents an extended key usage (EKU) X.509 certificate
   extension for restricting the applicability of a certificate to use
   with SIP.

1. Is the document readable?

Yes.

2. Does it contain nits?


3. Is the document class appropriate?

Previous EKU extensions (such as [RFC 4334]) have not been widely
deployed, due to the additional operational complexity they would
have introduced, and the limited benefits.

Given this, and the potential interoperability impact of this document,
the Experimental classification would probably be more appropriate.


4. Does the document consider existing solutions?

I don't believe that the document adequately discusses transition issues,
or existing practices. See below for detailed comments.

5. Does the solution break existing technology?

In situations where there are pre-existing certificates without the
EKU extensions, this specification could result in interoperability
problems if the "local policy" is not carefully implemented.  One
concern is that the language on "local policy" could be used by
implementers to justify refusing to support existing certificate
formats.

I do not think that the document adequately addresses how to manage
the transition.  For example, during an interim period, it would be
necessary for implementations to support both legacy certificates
as well as certificates with the new extensions.  At some point,
once the legacy certificates have expired, "local policy" could be
changed to require only certificates with extensions.

At various points in the document, I was unsure whether the term
"implementations" was referring to implementations of this specification,
or pre-existing implementations.  See below for detailed comments.

6. Does the solution preclude future activity?

Adding this EKU extension on the Standards Track is likely to create
a need for backward compatibility in the future.

7. Is the solution sufficiently configurable?

The document does not discuss what kinds of "local policy" are appropriate
in various situations or how the "local policy" can be configured
or managed.  Some additional discussion in this area would be helpful.

8. Can performance be measured?

The document does not address performance measurement.

9. Does the solution scale well?

Introducing this extension into an existing large scale certificate
deployments would require a lot of care, to avoid interoperability
problems.

10. Is Security Management discussed?

The document does not discuss how certificate interoperability issues
can be dealt with, or how operational problems could be
diagnosed.

------------------------------------------------
Detailed comments


Section 3

"  A Certificate Authority issuing a certificate whose purpose is to
   bind a SIP domain identity without binding other non-SIP identities
   MUST include an id-kp-SIPdomain attribute in the Extended Key Usage
   extension value (see Section 3.1).

[BA] Question: What is the definition of "SIP domain identity"?  This
is not included in the terminology section.

Section 4

"  Section 7.1 of Domain Certificates in the Session Initiation Protocol
   [8] contains the steps for finding an identity (or a set of
   identities) in an X.509 certificate for SIP.  In order to determine
   whether the usage of a certificate is restricted to serve as a SIP
   certificate only, implementations MUST perform the step given below
   as a part of the certificate validation:
"

[BA] Not sure how the first sentence relates to the rest of the paragraph.
Is the intent to suggest that the process for finding the identity
needs to be carried out in order to make the determination?  If so,
then [8] would be a normative reference.

"
   o  If the certificate does not contain any EKU values (the Extended
      Key Usage extension does not exist), it is a matter of local
      policy whether or not to accept the certificate for use as a SIP
      certificate.
"

[BA] There are a large number of existing certificates issued without these 
EKUs.
In situations in which these existing certificates are expected, leaving
their acceptance up to "local policy" would seem likely to create an
interoperability problem.

"
   o  If the certificate contains the id-kp-sipDomain EKU extension,
      then implementations MUST consider the certificate acceptable for
      use as a SIP certificate.
"

[BA] I presume that this means "implementations of this specification", correct?
Pre-existing implementations don't know about these EKU extensions, and
so will make their determination based on other factors.

"
   o  If EKU extension exists but does not contain any of the id-kp-
      sipDomain, id-kp-anyExtendedKeyUsage, id-kp-serverAuth, or id-kp-
      clientAuth EKU values, then implementations MUST NOT consider the
      certificate as acceptable for use as a SIP certificate.
"

[BA] Here I think you're referring to pre-existing implementations as well,
correct?
_______________________________________________
Ietf mailing list
Ietf(_at_)ietf(_dot_)org
https://www.ietf.org/mailman/listinfo/ietf
<Prev in Thread] Current Thread [Next in Thread>